CVE-2023-21264Improper Restriction of Operations within the Bounds of a Memory Buffer in Linux

Severity
6.7MEDIUMNVD
OSV7.0OSV5.5
EPSS
0.0%
top 97.29%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 14
Latest updateOct 31

Description

In multiple functions of mem_protect.c, there is a possible way to access hypervisor memory due to a memory access check in the wrong place. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.8 | Impact: 5.9

Affected Packages5 packages

debiandebian/linux< linux 6.3.7-1 (forky)
Debianlinux/linux_kernel< 6.3.7-1+1
CVEListV5google/androidAndroid kernel

Patches

🔴Vulnerability Details

4
OSV
linux-nvidia-6.2 vulnerabilities2023-10-31
OSV
linux, linux-aws, linux-aws-6.2, linux-azure, linux-azure-6.2, linux-azure-fde-6.2, linux-gcp, linux-gcp-6.2, linux-hwe-6.2, linux-ibm, linux-kvm, linux-lowlatency, linux-lowlatency-hwe-6.2, linux-ora2023-09-19
GHSA
GHSA-38wf-932f-qv6q: In multiple functions of mem_protect2023-08-14
OSV
CVE-2023-21264: In multiple functions of mem_protect2023-08-14

📋Vendor Advisories

5
Ubuntu
Linux kernel (NVIDIA) vulnerabilities2023-10-31
Ubuntu
Linux kernel vulnerabilities2023-09-19
Chrome
Stable Channel Update for ChromeOS / ChromeOS Flex: CVE-2023-43672023-08-25
Android
CVE-2023-21264: KVM2023-08-01
Debian
CVE-2023-21264: linux - In multiple functions of mem_protect.c, there is a possible way to access hyperv...2023